Analysis

  • max time kernel
    29s
  • max time network
    20s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-02-2024 12:36

General

  • Target

    AkebiLauncherInjectionFix.exe

  • Size

    88.8MB

  • MD5

    3e09e825e128b58ae0615b8d2e7125b5

  • SHA1

    19eda6aa5b2604af985305d99590666a77f7ce1c

  • SHA256

    326ef5ecf9c30558aecc826e23e32ff1bb5876399906b0108b1c2701ae961c6d

  • SHA512

    31927eafaf4b9ce4fbd994eecc7f625eae606499bd162f42189f004f9db0e65f26ab7dfd2fb423f5031eca8a8a456d488fa117ff3012224228feb8f29e941a82

  • SSDEEP

    1572864:MZ9ENal21u4x/MQNKdtdbBcRjsR1nmAUIQozSxlb7E6SjtsIw5yjhsEeAuMtVaUG:MDENal21TxklBJ1nmA9AbQ6Sj2IWWeAR

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AkebiLauncherInjectionFix.exe
    "C:\Users\Admin\AppData\Local\Temp\AkebiLauncherInjectionFix.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:3728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1476-0-0x00007FFFF4F50000-0x00007FFFF4F52000-memory.dmp

      Filesize

      8KB

    • memory/1476-1-0x00007FFFF4F60000-0x00007FFFF4F62000-memory.dmp

      Filesize

      8KB

    • memory/1476-2-0x00007FFFF4F70000-0x00007FFFF4F72000-memory.dmp

      Filesize

      8KB

    • memory/1476-3-0x00007FFFF3B00000-0x00007FFFF3B02000-memory.dmp

      Filesize

      8KB

    • memory/1476-4-0x00007FFFF3B10000-0x00007FFFF3B12000-memory.dmp

      Filesize

      8KB

    • memory/1476-5-0x00007FFFF2770000-0x00007FFFF2772000-memory.dmp

      Filesize

      8KB

    • memory/1476-6-0x00007FFFF2780000-0x00007FFFF2782000-memory.dmp

      Filesize

      8KB

    • memory/1476-7-0x0000000140000000-0x0000000141000000-memory.dmp

      Filesize

      16.0MB